oracle.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "os"
  21. "regexp"
  22. "sync"
  23. "time"
  24. "github.com/oracle/oci-go-sdk/v65/common"
  25. "github.com/oracle/oci-go-sdk/v65/common/auth"
  26. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  27. "github.com/oracle/oci-go-sdk/v65/secrets"
  28. "github.com/oracle/oci-go-sdk/v65/vault"
  29. "github.com/tidwall/gjson"
  30. corev1 "k8s.io/api/core/v1"
  31. "k8s.io/client-go/kubernetes"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  34. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  35. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  36. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  37. "github.com/external-secrets/external-secrets/pkg/utils"
  38. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  39. )
  40. const (
  41. errOracleClient = "cannot setup new oracle client: %w"
  42. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  43. errUninitalizedOracleProvider = "provider oracle is not initialized"
  44. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  45. errMissingPK = "missing PrivateKey"
  46. errMissingUser = "missing User ID"
  47. errMissingTenancy = "missing Tenancy ID"
  48. errMissingRegion = "missing Region"
  49. errMissingFingerprint = "missing Fingerprint"
  50. errMissingVault = "missing Vault"
  51. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  52. errMissingKey = "missing Key in secret: %s"
  53. errUnexpectedContent = "unexpected secret bundle content"
  54. )
  55. // https://github.com/external-secrets/external-secrets/issues/644
  56. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  57. var _ esv1beta1.Provider = &VaultManagementService{}
  58. type VaultManagementService struct {
  59. Client VMInterface
  60. KmsVaultClient KmsVCInterface
  61. VaultClient VaultInterface
  62. vault string
  63. compartment string
  64. encryptionKey string
  65. workloadIdentityMutex sync.Mutex
  66. }
  67. type VMInterface interface {
  68. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  69. }
  70. type KmsVCInterface interface {
  71. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  72. }
  73. type VaultInterface interface {
  74. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  75. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  76. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  77. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  78. }
  79. const (
  80. SecretNotFound = iota
  81. SecretExists
  82. SecretAPIError
  83. )
  84. func (vms *VaultManagementService) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  85. if vms.encryptionKey == "" {
  86. return errors.New("SecretStore must reference encryption key")
  87. }
  88. value := secret.Data[data.GetSecretKey()]
  89. if data.GetSecretKey() == "" {
  90. secretData := map[string]string{}
  91. for k, v := range secret.Data {
  92. secretData[k] = string(v)
  93. }
  94. jsonSecret, err := json.Marshal(secretData)
  95. if err != nil {
  96. return fmt.Errorf("unable to create json %v from value: %v", value, secretData)
  97. }
  98. value = jsonSecret
  99. }
  100. secretName := data.GetRemoteKey()
  101. encodedValue := base64.StdEncoding.EncodeToString(value)
  102. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  103. switch action {
  104. case SecretNotFound:
  105. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  106. CreateSecretDetails: vault.CreateSecretDetails{
  107. CompartmentId: &vms.compartment,
  108. KeyId: &vms.encryptionKey,
  109. SecretContent: vault.Base64SecretContentDetails{
  110. Content: &encodedValue,
  111. },
  112. SecretName: &secretName,
  113. VaultId: &vms.vault,
  114. },
  115. })
  116. return sanitizeOCISDKErr(err)
  117. case SecretExists:
  118. payload, err := decodeBundle(sec)
  119. if err != nil {
  120. return err
  121. }
  122. if bytes.Equal(payload, value) {
  123. return nil
  124. }
  125. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  126. SecretId: sec.SecretId,
  127. UpdateSecretDetails: vault.UpdateSecretDetails{
  128. SecretContent: vault.Base64SecretContentDetails{
  129. Content: &encodedValue,
  130. },
  131. },
  132. })
  133. return sanitizeOCISDKErr(err)
  134. default:
  135. return sanitizeOCISDKErr(err)
  136. }
  137. }
  138. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  139. secretName := remoteRef.GetRemoteKey()
  140. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  141. switch action {
  142. case SecretNotFound:
  143. return nil
  144. case SecretExists:
  145. if resp.TimeOfDeletion != nil {
  146. return nil
  147. }
  148. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  149. SecretId: resp.SecretId,
  150. })
  151. return sanitizeOCISDKErr(err)
  152. default:
  153. return sanitizeOCISDKErr(err)
  154. }
  155. }
  156. func (vms *VaultManagementService) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  157. return false, errors.New("not implemented")
  158. }
  159. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  160. var page *string
  161. var summaries []vault.SecretSummary
  162. for {
  163. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  164. CompartmentId: &vms.compartment,
  165. Page: page,
  166. VaultId: &vms.vault,
  167. })
  168. if err != nil {
  169. return nil, sanitizeOCISDKErr(err)
  170. }
  171. summaries = append(summaries, resp.Items...)
  172. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  173. break
  174. }
  175. }
  176. return vms.filteredSummaryResult(ctx, summaries, ref)
  177. }
  178. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  179. if utils.IsNil(vms.Client) {
  180. return nil, errors.New(errUninitalizedOracleProvider)
  181. }
  182. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  183. VaultId: &vms.vault,
  184. SecretName: &ref.Key,
  185. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  186. })
  187. if err != nil {
  188. return nil, sanitizeOCISDKErr(err)
  189. }
  190. payload, err := decodeBundle(sec)
  191. if err != nil {
  192. return nil, err
  193. }
  194. if ref.Property == "" {
  195. return payload, nil
  196. }
  197. val := gjson.Get(string(payload), ref.Property)
  198. if !val.Exists() {
  199. return nil, fmt.Errorf(errMissingKey, ref.Key)
  200. }
  201. return []byte(val.String()), nil
  202. }
  203. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  204. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  205. if !ok {
  206. return nil, errors.New(errUnexpectedContent)
  207. }
  208. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  209. if err != nil {
  210. return nil, err
  211. }
  212. return payload, nil
  213. }
  214. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  215. data, err := vms.GetSecret(ctx, ref)
  216. if err != nil {
  217. return nil, sanitizeOCISDKErr(err)
  218. }
  219. kv := make(map[string]string)
  220. err = json.Unmarshal(data, &kv)
  221. if err != nil {
  222. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  223. }
  224. secretData := make(map[string][]byte)
  225. for k, v := range kv {
  226. secretData[k] = []byte(v)
  227. }
  228. return secretData, nil
  229. }
  230. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  231. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  232. return esv1beta1.SecretStoreReadOnly
  233. }
  234. // NewClient constructs a new secrets client based on the provided store.
  235. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  236. storeSpec := store.GetSpec()
  237. oracleSpec := storeSpec.Provider.Oracle
  238. if oracleSpec.Vault == "" {
  239. return nil, errors.New(errMissingVault)
  240. }
  241. if oracleSpec.Region == "" {
  242. return nil, errors.New(errMissingRegion)
  243. }
  244. var (
  245. err error
  246. configurationProvider common.ConfigurationProvider
  247. )
  248. if oracleSpec.PrincipalType == esv1beta1.WorkloadPrincipal {
  249. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  250. } else if oracleSpec.PrincipalType == esv1beta1.InstancePrincipal || oracleSpec.Auth == nil {
  251. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  252. } else {
  253. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  254. }
  255. if err != nil {
  256. return nil, fmt.Errorf(errOracleClient, err)
  257. }
  258. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  259. if err != nil {
  260. return nil, fmt.Errorf(errOracleClient, err)
  261. }
  262. secretManagementService.SetRegion(oracleSpec.Region)
  263. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  264. if err != nil {
  265. return nil, fmt.Errorf(errOracleClient, err)
  266. }
  267. kmsVaultClient.SetRegion(oracleSpec.Region)
  268. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  269. if err != nil {
  270. return nil, fmt.Errorf(errOracleClient, err)
  271. }
  272. vaultClient.SetRegion(oracleSpec.Region)
  273. if storeSpec.RetrySettings != nil {
  274. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  275. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  276. opts = append(opts, common.WithMaximumNumberAttempts(uint(*mr)))
  277. }
  278. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  279. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  280. if err != nil {
  281. return nil, fmt.Errorf(errOracleClient, err)
  282. }
  283. opts = append(opts, common.WithFixedBackoff(i))
  284. }
  285. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  286. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  287. RetryPolicy: &customRetryPolicy,
  288. })
  289. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  290. RetryPolicy: &customRetryPolicy,
  291. })
  292. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  293. RetryPolicy: &customRetryPolicy,
  294. })
  295. }
  296. return &VaultManagementService{
  297. Client: secretManagementService,
  298. KmsVaultClient: kmsVaultClient,
  299. VaultClient: vaultClient,
  300. vault: oracleSpec.Vault,
  301. compartment: oracleSpec.Compartment,
  302. encryptionKey: oracleSpec.EncryptionKey,
  303. }, nil
  304. }
  305. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  306. // Try to look up the secret, which will determine if we should create or update the secret.
  307. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  308. SecretName: &secretName,
  309. VaultId: &vms.vault,
  310. })
  311. // Get a PushSecret action depending on the ListSecrets response.
  312. action := getSecretBundleCode(err)
  313. return resp, action, err
  314. }
  315. func getSecretBundleCode(err error) int {
  316. if err != nil {
  317. // If we got a 404 service error, try to create the secret.
  318. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  319. return SecretNotFound
  320. }
  321. return SecretAPIError
  322. }
  323. // Otherwise, update the existing secret.
  324. return SecretExists
  325. }
  326. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  327. secretMap := map[string][]byte{}
  328. for _, summary := range secretSummaries {
  329. matches, err := matchesRef(summary, ref)
  330. if err != nil {
  331. return nil, err
  332. }
  333. if !matches || summary.TimeOfDeletion != nil {
  334. continue
  335. }
  336. secret, err := vms.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{
  337. Key: *summary.SecretName,
  338. })
  339. if err != nil {
  340. return nil, err
  341. }
  342. secretMap[*summary.SecretName] = secret
  343. }
  344. return secretMap, nil
  345. }
  346. func matchesRef(secretSummary vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (bool, error) {
  347. if ref.Name != nil {
  348. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  349. if err != nil {
  350. return false, err
  351. }
  352. return matchString, nil
  353. }
  354. for k, v := range ref.Tags {
  355. if val, ok := secretSummary.FreeformTags[k]; ok {
  356. if val == v {
  357. return true, nil
  358. }
  359. }
  360. }
  361. return false, nil
  362. }
  363. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  364. if secretRef.Name == "" {
  365. return "", errors.New(errORACLECredSecretName)
  366. }
  367. secret, err := resolvers.SecretKeyRef(
  368. ctx,
  369. kube,
  370. storeKind,
  371. namespace,
  372. &secretRef,
  373. )
  374. if err != nil {
  375. return "", fmt.Errorf(errFetchSAKSecret, err)
  376. }
  377. return secret, nil
  378. }
  379. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  380. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  381. if err != nil {
  382. return nil, err
  383. }
  384. if privateKey == "" {
  385. return nil, errors.New(errMissingPK)
  386. }
  387. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  388. if err != nil {
  389. return nil, err
  390. }
  391. if fingerprint == "" {
  392. return nil, errors.New(errMissingFingerprint)
  393. }
  394. if store.Auth.User == "" {
  395. return nil, errors.New(errMissingUser)
  396. }
  397. if store.Auth.Tenancy == "" {
  398. return nil, errors.New(errMissingTenancy)
  399. }
  400. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  401. }
  402. func (vms *VaultManagementService) Close(_ context.Context) error {
  403. return nil
  404. }
  405. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  406. _, err := vms.KmsVaultClient.GetVault(
  407. context.Background(), keymanagement.GetVaultRequest{
  408. VaultId: &vms.vault,
  409. },
  410. )
  411. if err != nil {
  412. failure, ok := common.IsServiceError(err)
  413. if ok {
  414. code := failure.GetCode()
  415. switch code {
  416. case "NotAuthenticated":
  417. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  418. case "NotAuthorizedOrNotFound":
  419. // User authentication was successful, but user might not have a permission like:
  420. //
  421. // Allow group external_secrets to read vaults in tenancy
  422. //
  423. // Which is fine, because to read secrets we only need:
  424. //
  425. // Allow group external_secrets to read secret-family in tenancy
  426. //
  427. // But we can't test for this permission without knowing the name of a secret
  428. return esv1beta1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  429. default:
  430. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  431. }
  432. } else {
  433. return esv1beta1.ValidationResultError, err
  434. }
  435. }
  436. return esv1beta1.ValidationResultReady, nil
  437. }
  438. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  439. storeSpec := store.GetSpec()
  440. oracleSpec := storeSpec.Provider.Oracle
  441. vault := oracleSpec.Vault
  442. if vault == "" {
  443. return nil, errors.New("vault cannot be empty")
  444. }
  445. region := oracleSpec.Region
  446. if region == "" {
  447. return nil, errors.New("region cannot be empty")
  448. }
  449. auth := oracleSpec.Auth
  450. if auth == nil {
  451. return nil, nil
  452. }
  453. user := oracleSpec.Auth.User
  454. if user == "" {
  455. return nil, errors.New("user cannot be empty")
  456. }
  457. tenant := oracleSpec.Auth.Tenancy
  458. if tenant == "" {
  459. return nil, errors.New("tenant cannot be empty")
  460. }
  461. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  462. if privateKey.Name == "" {
  463. return nil, errors.New("privateKey.name cannot be empty")
  464. }
  465. if privateKey.Key == "" {
  466. return nil, errors.New("privateKey.key cannot be empty")
  467. }
  468. err := utils.ValidateSecretSelector(store, privateKey)
  469. if err != nil {
  470. return nil, err
  471. }
  472. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  473. if fingerprint.Name == "" {
  474. return nil, errors.New("fingerprint.name cannot be empty")
  475. }
  476. if fingerprint.Key == "" {
  477. return nil, errors.New("fingerprint.key cannot be empty")
  478. }
  479. err = utils.ValidateSecretSelector(store, fingerprint)
  480. if err != nil {
  481. return nil, err
  482. }
  483. if oracleSpec.ServiceAccountRef != nil {
  484. if err := utils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  485. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  486. }
  487. }
  488. return nil, nil
  489. }
  490. func (vms *VaultManagementService) getWorkloadIdentityProvider(store esv1beta1.GenericStore, serviceAcccountRef *esmeta.ServiceAccountSelector, region, namespace string) (configurationProvider common.ConfigurationProvider, err error) {
  491. defer func() {
  492. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  493. err = errors.Join(err, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, uerr))
  494. }
  495. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  496. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  497. }
  498. vms.workloadIdentityMutex.Unlock()
  499. }()
  500. vms.workloadIdentityMutex.Lock()
  501. // OCI SDK requires specific environment variables for workload identity.
  502. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  503. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, err)
  504. }
  505. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  506. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, err)
  507. }
  508. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  509. if serviceAcccountRef == nil {
  510. return auth.OkeWorkloadIdentityConfigurationProvider()
  511. }
  512. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  513. if err = utils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  514. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  515. }
  516. cfg, err := ctrlcfg.GetConfig()
  517. if err != nil {
  518. return nil, err
  519. }
  520. clientset, err := kubernetes.NewForConfig(cfg)
  521. if err != nil {
  522. return nil, err
  523. }
  524. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  525. return auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  526. }
  527. func sanitizeOCISDKErr(err error) error {
  528. if err == nil {
  529. return nil
  530. }
  531. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  532. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  533. return fmt.Errorf("%s service failed to %s, HTTP status code %d: %s", serviceError.GetTargetService(), serviceError.GetOperationName(), serviceError.GetHTTPStatusCode(), serviceError.GetMessage())
  534. }
  535. return err
  536. }
  537. func init() {
  538. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  539. Oracle: &esv1beta1.OracleProvider{},
  540. })
  541. }